Goodreads helps you keep track of books you want to read.
Start by marking “Extrusion Detection: Security Monitoring for Internal Intrusions” as Want to Read:
Extrusion Detection: Security Monitoring for Internal Intrusions
Enlarge cover
Rate this book
Clear rating

Extrusion Detection: Security Monitoring for Internal Intrusions

4.16 of 5 stars 4.16  ·  rating details  ·  25 ratings  ·  4 reviews
Overcome Your Fastest-Growing Security Problem: Internal, Client-Based Attacks Today's most devastating security attacks are launched from within the company, by intruders who have compromised your users' Web browsers, e-mail and chat clients, and other Internet-connected software. Hardening your network perimeter won't solve this problem. You must systematically protect c...more
Paperback, 416 pages
Published November 8th 2005 by Addison Wesley
more details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about Extrusion Detection, please sign up.

Be the first to ask a question about Extrusion Detection

This book is not yet featured on Listopia. Add this book to your favorite list »

Community Reviews

(showing 1-30 of 55)
filter  |  sort: default (?)  |  rating details
Josh Brower
“This is my 2nd book by Bejtlich that I have read, with the first being “The Tao of Network Security Monitoring: Beyond Intrusion Detection.” While the Tao of NSM focused mainly on detecting attacks coming in from the perimeter, this book focused on Network Security Monitoring principles as applied to traffic going out of the network.
Bejtlich starts out by doing an overview of Network Security Monitoring, referencing his earlier book as a more in-depth treatise on NSM. He then goes on to the the...more
Jon
Let's hear it for another exceptionally well written book on network monitoring. Aside from a very clear
and easy to understand writing style, Richard hits home with practicality and rich detail. I've become
a big fan of his writings including those on his informative blog, http://taosecurity.blogspot.com/.

First, the praise.New material, different from that in Tao his former book, includes a more extensive look
at taps, along with defense and mitigation ( and lots of it), querying NMS data from dat...more
Anthony
Good follow up to The Tao of Network Security Monitoring. The chapters on Network Incident Response and Network Forsensics were the most informative for me.
Jimboninja
This book is readable and useful, but in the end I think if you've carefully read "The Tao of NSM", then you've gotten all the information you're going to from both books...
James
James marked it as to-read
Sep 30, 2014
Mark
Mark marked it as to-read
Apr 26, 2014
Mike Boya
Mike Boya marked it as to-read
Mar 07, 2014
Alex
Alex marked it as to-read
Dec 31, 2013
Jimmy
Jimmy marked it as to-read
Nov 05, 2013
Joel Anderson
Joel Anderson marked it as to-read
Sep 14, 2013
Julien Iguchi-cartigny
Julien Iguchi-cartigny marked it as to-read
Sep 09, 2013
Todd Smeed
Todd Smeed marked it as to-read
Aug 02, 2013
Amin
Amin marked it as to-read
Jul 09, 2013
David Buchanan
David Buchanan is currently reading it
Jul 02, 2013
Rick Howard
Rick Howard marked it as to-read
Jun 27, 2013
Ross Warren
Ross Warren marked it as to-read
May 31, 2013
Dan Lloyd
Dan Lloyd marked it as to-read
May 27, 2013
Sergej
Sergej marked it as to-read
Feb 24, 2013
Martisch
Martisch marked it as to-read
Feb 03, 2013
« previous 1 next »
There are no discussion topics on this book yet. Be the first to start one »
The Tao of Network Security Monitoring: Beyond Intrusion Detection The Practice of Network Security Monitoring: Understanding Incident Detection and Response The Tao of Network Security Monitoring: Beyond Intrusion Detection Real Digital Forensics: Computer Security and Incident Response Computer Forensics Library Boxed Set

Share This Book